aboutsummaryrefslogtreecommitdiffstats
path: root/man7/user_namespaces.7
diff options
authorAlejandro Colomar <alx@kernel.org>2023-02-05 23:14:38 +0100
committerAlejandro Colomar <alx@kernel.org>2023-02-05 23:14:42 +0100
commitcdede5cdd1b0ba75135d3b32d96354026e96f866 (patch)
treef21d7604d25b2de607ef5471e5e180094231e046 /man7/user_namespaces.7
parentf29fc8dcf0da15a596a7cdc7e5a0b2932100b522 (diff)
downloadman-pages-cdede5cdd1b0ba75135d3b32d96354026e96f866.tar.gz
Many pages: Use \[bu] instead of \(bu
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Diffstat (limited to 'man7/user_namespaces.7')
-rw-r--r--man7/user_namespaces.758
1 files changed, 29 insertions, 29 deletions
diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7
index 6011829d9a..6647b02bf7 100644
--- a/man7/user_namespaces.7
+++ b/man7/user_namespaces.7
@@ -157,7 +157,7 @@ its original user namespace.
.PP
The rules for determining whether or not a process has a capability
in a particular user namespace are as follows:
-.IP \(bu 3
+.IP \[bu] 3
A process has a capability inside a user namespace
if it is a member of that namespace and
it has the capability in its effective capability set.
@@ -173,11 +173,11 @@ or
.BR setns (2),
as already described.
.\" In the 3.8 sources, see security/commoncap.c::cap_capable():
-.IP \(bu
+.IP \[bu]
If a process has a capability in a user namespace,
then it has that capability in all child (and further removed descendant)
namespaces as well.
-.IP \(bu
+.IP \[bu]
.\" * The owner of the user namespace in the parent of the
.\" * user namespace has all caps.
When a user namespace is created, the kernel records the effective
@@ -234,29 +234,29 @@ and mount the following types of filesystems:
.PP
.RS 4
.PD 0
-.IP \(bu 3
+.IP \[bu] 3
.I /proc
(since Linux 3.8)
-.IP \(bu
+.IP \[bu]
.I /sys
(since Linux 3.8)
-.IP \(bu
+.IP \[bu]
.I devpts
(since Linux 3.9)
-.IP \(bu
+.IP \[bu]
.BR tmpfs (5)
(since Linux 3.9)
-.IP \(bu
+.IP \[bu]
.I ramfs
(since Linux 3.9)
-.IP \(bu
+.IP \[bu]
.I mqueue
(since Linux 3.9)
-.IP \(bu
+.IP \[bu]
.I bpf
.\" commit b2197755b2633e164a439682fb05a9b5ea48f706
(since Linux 4.4)
-.IP \(bu
+.IP \[bu]
.I overlayfs
.\" commit 92dbc9dedccb9759c7f9f2f0ae6242396376988f
.\" commit 4cb2c00c43b3fe88b32f29df4f76da1b92c33224
@@ -499,12 +499,12 @@ The lines written to
.I uid_map
.RI ( gid_map )
must conform to the following validity rules:
-.IP \(bu 3
+.IP \[bu] 3
The three fields must be valid numbers,
and the last field must be greater than 0.
-.IP \(bu
+.IP \[bu]
Lines are terminated by newline characters.
-.IP \(bu
+.IP \[bu]
There is a limit on the number of lines in the file.
In Linux 4.14 and earlier, this limit was (arbitrarily)
.\" 5*12-byte records could fit in a 64B cache line
@@ -519,7 +519,7 @@ and the write must be performed at the start of the file (i.e.,
and
.BR pwrite (2)
can't be used to write to nonzero offsets in the file).
-.IP \(bu
+.IP \[bu]
The range of user IDs (group IDs)
specified in each line cannot overlap with the ranges
in any other lines.
@@ -532,7 +532,7 @@ which prevented some otherwise valid maps from being created.
Linux 3.9 and later
.\" commit 0bd14b4fd72afd5df41e9fd59f356740f22fceba
fix this limitation, allowing any valid set of nonoverlapping maps.
-.IP \(bu
+.IP \[bu]
At least one line must be written to the file.
.PP
Writes that violate the above rules fail with the error
@@ -542,21 +542,21 @@ In order for a process to write to the
.IR /proc/ pid /uid_map
.RI ( /proc/ pid /gid_map )
file, all of the following permission requirements must be met:
-.IP \(bu 3
+.IP \[bu] 3
The writing process must have the
.B CAP_SETUID
.RB ( CAP_SETGID )
capability in the user namespace of the process
.IR pid .
-.IP \(bu
+.IP \[bu]
The writing process must either be in the user namespace of the process
.I pid
or be in the parent user namespace of the process
.IR pid .
-.IP \(bu
+.IP \[bu]
The mapped user IDs (group IDs) must in turn have a mapping
in the parent user namespace.
-.IP \(bu
+.IP \[bu]
If updating
.IR /proc/ pid /uid_map
to create a mapping that maps UID 0 in the parent namespace,
@@ -598,7 +598,7 @@ capability, it could create a binary with namespaced file capabilities
that would then be effective in the parent user namespace
(because the root user IDs are the same in the two namespaces).
.RE
-.IP \(bu
+.IP \[bu]
One of the following two cases applies:
.RS
.IP (a) 5
@@ -610,7 +610,7 @@ capability in the
.I parent
user namespace.
.RS
-.IP \(bu 3
+.IP \[bu] 3
No further restrictions apply:
the process can make mappings to arbitrary user IDs (group IDs)
in the parent user namespace.
@@ -619,7 +619,7 @@ in the parent user namespace.
.I Or
otherwise all of the following restrictions apply:
.RS
-.IP \(bu 3
+.IP \[bu] 3
The data written to
.I uid_map
.RI ( gid_map )
@@ -627,10 +627,10 @@ must consist of a single line that maps
the writing process's effective user ID
(group ID) in the parent user namespace to a user ID (group ID)
in the user namespace.
-.IP \(bu
+.IP \[bu]
The writing process must have the same effective user ID as the process
that created the user namespace.
-.IP \(bu
+.IP \[bu]
In the case of
.IR gid_map ,
use of the
@@ -675,12 +675,12 @@ to fail with the error
The permission rules for writing to the
.IR /proc/ pid /projid_map
file are as follows:
-.IP \(bu 3
+.IP \[bu] 3
The writing process must either be in the user namespace of the process
.I pid
or be in the parent user namespace of the process
.IR pid .
-.IP \(bu
+.IP \[bu]
The mapped project IDs must in turn have a mapping
in the parent user namespace.
.PP
@@ -965,9 +965,9 @@ Within a user namespace,
these capabilities allow a process to bypass the rules
if the process has the relevant capability over the file,
meaning that:
-.IP \(bu 3
+.IP \[bu] 3
the process has the relevant effective capability in its user namespace; and
-.IP \(bu
+.IP \[bu]
the file's user ID and group ID both have valid mappings
in the user namespace.
.PP